SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Shanasa Rahel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2181-2185

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Implementation and Analysis of Wimax Module under Ns2 with
Varying Mobility Model
Shanasa Rahel¹, Deepali Shukla²
1

M.E. (Electronics and Communication)
²Asst. Prof. Dept of E&C, MITM, Indore

Abstract
The network simulator 2 (ns-2) is a popular and powerful simulation tool for the simulation of packet-switched
networks, which provides substantial support for simulation of TCP, routing, and MAC protocols over wired
and wireless networks, such as wireless LANs, mobile ad hoc networks (MANETs), and satellite
communications, etc, and is widely used in both academia and industry. Although many protocol modules have
been implemented in the ns-2, the IEEE 802.16 broadband wireless access networks (BWANs) or WiMAX
module has not been contributed yet. Thus, in this paper, we present our detailed design and implementation of
the WiMAX module based on the IEEE 802.16 standard with the point-to-multipoint (PMP) mode for the ns-2.
The implemented module comprises fundamental functions of the service-specific convergence sublayer (CS),
the MAC common part sublayer (CPS), and the PHY layer. A simple call admission control (CAC) mechanism
and the scheduler are also included in this module.

I.

Introduction

The IEEE 802.16 standard forms the basis
of Worldwide Interoperability for Microwave Access
(WiMAX). It was developed by the WiMAX Forum
with the objective of providing high speed data
transfers over the air. The WiMAX Forum is an
industry-led, non-profit organization that certifies
and promotes the compatibility and interoperability
of broadband wireless products based upon IEEE
Standard 802.16 [1]. WiMAX has its origin in the
computer industry and is an alternative to Third
Generation Partnership Project (3GPP) and
technologies like High Speed Packet Access (HSPA)
and Long Term Evolution (LTE).
The most popular network simulator used
by the academia and industry is the network
simulator 2 (ns-2) [11], which has become the de
facto standards for the simulation of packet-switched
networks. Specifically, more and more published
wireless network studies and investigations use ns-2
to evaluate and verify their work. Although there still
another force investigates the IEEE 802.16-based
simulator [8], this simulator is not public. The ns-2 is
roughly composed of various traffic models,
transport-layer protocols, network-layer protocols,
and medium access control (MAC) layer protocols,
etc. These components enable ns-2 to simulate
different types of networks and their topologies.
Researchers can benefit from these preliminary tests
on their investigation and find out the drawbacks of
their new design in efficient way.
Until today, as the best knowledge of the
authors, no WiMAX/IEEE 802.16 module has been
contributed to ns-2. Due to these reasons, we design
and implement the WiMAX module for ns-2. The
www.ijera.com

developed WiMAX module is focused on MAC
protocol development and inherited from the original
MAC class in ns-2. This module is based on IEEE
802.16 point-to-multipoint (PMP) mode, which
means that one BS can serve multiple subscriber
stations (SSs) concurrently. We choose the
orthogonal frequency-division multiple access
(OFDMA) scheme for the physical (PHY) layer.
Based on the OFDMA PHY specifications, it has
been of major interest for both wireless applications
due to its high date rate transmission capability and
its robustness to multipath delay spread [9].
The IEEE 802.16 standard defines the
specifications related to the service-specific
convergence sublayer (CS), the MAC common part
sublayer (CPS), the security sublayer, and the PHY
layer. The MAC management messages, such as
downlink/ uplink map (DL-MAP/UL-MAP),
downlink/uplink channel descriptor (DCD/UCD),
ranging request/response (RNGREQ/ RNG-RSP),
and so forth are implemented following the 802.16
standard to operate the WiMAX networks. All
operations between the base station (BS) and
subscriber stations (SSs) over a superframe interval
follow the compulsory procedures of the 802.16
standard.

II.

An Overview of IEEE 802.16
Standards

The section briefly summarizes the
operations of MAC and PHY layers in the IEEE
802.16 standard. Fig. 1 illustrates the architecture of
IEEE 802.16. The CS provides any transformation or
mapping of external network data that is received
2181 | P a g e
Shanasa Rahel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2181-2185
through the CS service access point (SAP) and
converts them into MAC service data units (MSDUs)
received by the MAC layer through the MAC SAP.
This sublayer includes classifying external network
SDUs and associating them to the proper MAC
service flow identifier (SFID) and connection ID
(CID). In addition, it may also include the payload
header suppression (PHS) function.
The MAC CPS provides the core MAC
functionality of system access, bandwidth allocation,
scheduling, contention mechanism, connection
establishment, and connection maintenance. It
receives data from various CSs through the MAC
SAP, which is classified to particular MAC
connections. The IEEE 802.16-2004 standard
supports four quality-of-service scheduling types:
unsolicited grant service (UGS) for the constant bit
rate (CBR) service, real-time polling service (rtPS)
for the variable bit rate (VBR) service, non-real-time
polling service (nrtPS) for non-real-time VBR, and
best effort service (BE) for service with no rate or
delay requirements. In 802.16e standard, there is an
additional service type called extended real-time
polling service (ertPS) for voice over IP (VoIP)
service with silence suppression.
These quality-of-service (QoS) classes are
associated with certain predefined sets of QoSrelated service flow parameters, and the MAC
scheduler supports the appropriate data handling
mechanisms for data transport according to each
QoS classes. The upper-layer protocol data units
(PDUs) are inserted into different levels of queues
with an assigned CID in the MAC layer after the
SFID-CID mapping. These data packets in these
queues are treated as MSDUs and then will be
fragmented or packed into various sizes according to
the MAC scheduling operations. They will be
processed by a selective repeat automatic repeat
request (ARQ) block mechanism if the ARQ-enabled
function is on.
For the UL traffic, each SS should range to
the BS before entering the system. During the initial
ranging period, the SS will request to be served in
the DL via the particular burst profile by transmitting
its choice of DL interval usage code (DIUC) to the
BS. Afterwards, the BS will command the SS to use
a particular uplink burst profile with the allocated
UL interval usage code (UIUC) with the grant of SS
in UL-MAP messages. The DL-MAP and UL-MAP
contain the channel ID and the MAP information
elements (IEs) which describes the PHY
specification mapping in the UL and DL
respectively. They are based on the different PHY
specifications, such as single carrier (SC), single
carrier access (SCa), OFDM, and OFDMA. The
burst profile includes the DIUC, UIUC, and the typelength-value (TLV) encoded information. The TLV
encoded information will notify the PHY layer of the
modulation type, FEC code type, and encoding

www.ijera.com

www.ijera.com

parameters. The MAC data payload is packed by
these encoding type.
The PHY layer requires equal radio link
control (RLC), which is the capability of the PHY
layer to transit from one burst profile to another. The
RLC begins with the periodic BS broadcasting of the
burst profiles which have been chosen for the
downlink or the uplink connections. After the initial
determination of downlink and uplink burst profiles
between the BS and a particular SS, RLC continues
to monitor and control the burst profiles. The SS can
range with the RNGREQ message to request a
change in the downlink burst profile. The channel
measurements report request (REPREQ) message
will be used by a BS to request signal-to-noise ratio
(SNR) channel measurements reports. The channel
measurement report response (REP-RSP) message is
used by the SS to respond the channel measurements
listed in the received REP-REQ.
The IEEE 802.16 uses the frame-based
transmission architecture where the frame length is
variable. Each frame is called a superframe and is
divided into two subframes: the DL subframe and
the UL subframe. In this paper, we are focusing the
frame structure of the OFDMA-PHY in time division
duplex (TDD) mode. A DL subframe consists of DL
subframe prefix to specify the modulation and
coding (in PHY mode), the length of the first DL
burst, and the broadcasted MAC control messages,
e.g., the downlink channel descriptor (DCD) and the
uplink channel descriptor (UCD). Both of them
define the characteristics of the physical channels by
comprising the detail information of the DL burst
profile and the UL burst profile.
Although IEEE 802.16 defines the
connection signaling (connection requests and
responses) between SS and BS, itdoes not define the
admission control process. All packets from the
application layer are classified by the connection
classifier based on the CID and are forwarded to the
appropriate queue. At the SS, the scheduler will
retrieve the packets from the queues and transmit
them to the network in the appropriate time slots as
defined by the UL-MAP sent by the BS. The ULMAP is determined by the scheduler module based
on the BW-request messages. These messages report
the current queue size of each connection in SS.
The IEEE 802.16 NS-2 Modules:
The developed 802.16-based WiMAX
module named as the Mac802 16 class is in
accordance with the specifications of the IEEE
802.16-2004 standard [1] and based on the ns-2
version 2.29 [11]. All modules are designed by using
object oriented programming language C++ and
modeled as several classes. The relationship between
the WiMAX module and legacy ns-2 modules is
based on the original network component stack of
the ns-2 as shown in Fig 2. It illustrates the type of
objects for the traffic generating agent (TGA), the
2182 | P a g e
Shanasa Rahel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2181-2185
link layer (LL), the interface queue (IFQ), the
designed MAC layer (WiMAX module), and the
PHY layer (Channel).
First, the TGA is considered simply as an
application level traffic generator that generates
VoIP, MPEG, FTP, HTTP traffic, and so on. These
traffic are classified into five different types of
service, the UGS, rtPS, ertPS, nrtPS, and BE, each
with its own priority. All packets will be transferred
to different types of priority queues according to
their service types by using CS layer SFID-CID
mapping mechanism. The data packets in these
queues are treated as MSDUs and will be selected to
pass into the WiMAX module in a round robin
manner.
While the WiMAX module in the SS
receives the MSDUs from the Queue object, the
MAC management component will initiate the
ranging process to enter the WiMAX system or to
transmit the MSDUs according to the scheduled time
obtained from UL-MAP. Once the process has been
successfully finished in the MAC layer, the Network
Interface will add a propagation delay and broadcast
in the air interface.
Simulation environment:
Simulation Tool
No.Of Nodes
IEEE Standard
BS
Mobility Model
Antenna Model
Mobility Speed
Routing Protocol
Simulation Area
Simulation Time

III.

NS-2
40
802.16
1
Random Way Point
Omni Directional
20m/sec,250m/sec
AODV,DSR,DSDV
2 Km
200 sec.

Results & Analysis

Wimax with low mobility Model:
Parameter
AODV
DSR

DSDV

Delay(in ms)

146.73

413.15

139.44

Throughput(in
kbps)

539.41

413.15

659.26

www.ijera.com

End to End Delay Analysis: From Below Graphs in
Fig1 and 2 it is clear that when node moves very
rapidly than the delay is low as compare to the delay
when the speed of nodes are slow.
500
400
300
200
100
0
AODV

DSR

DSDV

Figure-1

126
124
122
120
118
116
114
112
110
108

Delay(in ms)

AODV

DSR

DSDV

Figure-2
Throughput Analysis: In terms of throughput it is
clear from below figure 3 & 4 that the wimax
module with high mobility in fig-3 shows better Data
transmission known as throughput in kbps. In low
speed model throughput is less as compare with
high speed model shown in fig-4.

700
600

PDR (in %)

96.19

96.16

93.06

500
400

Throughput(in kbps)

300

Wimax with low mobility Model:

200

Parameter

AODV

DSR

DSDV

Delay(in ms)

122.14

124.73

114.34

Throughput(in

666.76

651.69

680.68

www.ijera.com

0

Figure-3

kbps)
PDR (in %)

100

98.45

99.32

96.34
2183 | P a g e
Shanasa Rahel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2181-2185

www.ijera.com

References:
[1]

700
600
500
400
Throughput(in kbps)

300
200
100
0
AODV

DSR

DSDV

Figure-4
Packet Delivery Ratio Analysis: In terms of packet
delivery ratio the wimax module with high mobility
in figure 5 shows better performance than that of
with low mobility model in figure-6 in our case we
have taken low mobility scenario as 25m/sec and
high mobility scenario as 250 m/sec

99.5
99
98.5
98
97.5
97
96.5
96
95.5
95
94.5

PDR (in %)

AODV

DSR

DSDV

Figure-5
97
96
95
94

PDR (in %)

93
92
91
AODV

DSR

DSDV

Figure-6
Conclusion: We have implemented Firstly Wimax
Module under Ns-2 Simulator and then analyzed its
performance under various routing protocols. From
above results it is clear that when in a wimax
scenario nodes move rapidly than the overall
performance of network is good in terms of PDR and
Throughput as Compare to the scenario having slow
speed of node movement.

www.ijera.com

Siva Ram Murthy, C., and Manoj, B.S.
Second Edition, Low price Edition, Pearson
Education, 2007.Ad-hoc Wireless Networks,
Architectures and Protocols.
[2] Feeney,
L.M.,
and
Nilsson,
M.,
“Investigating the energy consumption of a
wireless network interface in an Ad-hoc
networking environment”, In Proceedings of
the IEEE INFOCOM, pp.1548 - 1557, 2001.
[3] Ramanathan,
R.,
and
Rosales-Hain,
R.,“Topology control of multihop wireless
networks using transmit power adjustment”,
In Proceedings of the IEEE INFOCOM, pp.
404–413, 2000.
[4] Suchismita Chinara and Santanu Kumar
Rath, “Topology Control by Transmission
Range Adjustment Protocol for Clustered
Mobile
Ad
Hoc
Networks”,ISRN
Communications and Networking,2011
[5] Usop, N., Abdullah, A., and Abidin, A.,
“Performance Evaluation of AODV, DSDV
and DSR routing Protocol in Grid
Environment”, International Journal of
Computer and Network Security, vol. 9, no.
7, 2009.
[6] Rahman,
A.,
and
Zukarnain,
Z.,
“Performance Comparison of AODV, DSDV
and I-DSDV Routing Protocols in Mobile
Ad-hoc Networks”, European Journal of
Scientific Research, vol. 31, no. 4, pp. 566–
576, 2009.
[7] Harminder S. Bindra, Sunil K. Maakar and
Sangal, A.L., “ Performance Evaluation of
Two Reactive Routing Protocols of MANET
using Group Mobility Model”,IJCSI
International Journal of Computer Science
Issues, vol. 7, no. 10, May 2010.
[8] Anwar, F., Azad, M., Rahman,M., and
Uddin,M., “Performance Analysis of Ad-hoc
Routing Protocols in Mobile WiMAX
Environment,”IAENG International Journal
of Computer Science, vol. 35, no. 3, pp. 353–
359,2008.
[9] Vivek Thaper, Bindyia Jain, and Varsha
Sahni, “Performance analysis of adhoc
routing protocols using random waypoint
mobility model in wireless sensor networks”,
International Journal on Computer Science
and Engineering (IJCSE),August 2011.
[10] Sreerama Murty, M.,and Venkat Das,M.,
“Performance Evalution of MANET Routing
Protocols using Reference Point Group
Mobility
and
Random
WayPoint
Models”,International Journal of Ad hoc,
Sensor & Ubiquitous Computing (IJASUC)
vol.2, no.1, March 2011
[11] Nadesh, R. K., Sumathy, D., and Benjula
Anbu Malar, M.B. “Performance Analysis of
MANET (WLAN) Using Different Routing
2184 | P a g e
Shanasa Rahel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2181-2185

[12]

[13]

[14]

[15]

[16]

[17]
[18]

www.ijera.com

Protocols in Multi service Environments-An
Quantitative Study”, Advanced Networking
and Applications vol. 03, no.02, pp:10761079 ,2011.
Boomarani Malany,A.,Sarma Dhulipala,
V.R.,
and
Chandrasekaran,
RM
,
“Throughput and Delay Comparison of
MANET Routing Protocols” ,Int. J. Open
Problems Compt. Math.,vol. 2, no. 3,
September 2009.
Rajneesh Kumar Gujral, and Manpreet
Singh, “Performance Analysis of Ad hoc
Routing Protocols for Voice Communication
Support over Hybrid MANETs”, IJCA vol.
22,no.3, May 2011.
Godder,T.K., Hossain,M.M., Rahman,M.M.,
Sipon Miah,Md and Mondal, S. K.,
“Performance comparison and analysis of
mobile ad hoc routing Protocols” ,Computer
Science & Engineering: An International
Journal (CSEIJ), vol.1, no.1, April 2011.
Charles Perkins, Elizabeth Royer, and Samir
Das., “Ad-hoc on demand distance vector
(AODV) routing”, July 2003.
David B. Johnson and David A. Maltz,
“Dynamic source routing in Ad-hoc wireless
networks”, Technical report, Carnegie
Mellon University, 1996.
NETWORK
SIMULATOR
(ns2).
http://www.isi.edu/nsnam/ns/.
Marc
Geris'
Tutorial
for
the
UCB/LBNL/VINT Network Simulator "ns"

www.ijera.com

2185 | P a g e

Contenu connexe

Tendances

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Comparative study on priority based qos
Comparative study on priority based qosComparative study on priority based qos
Comparative study on priority based qosijwmn
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
 
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...Eiko Seidel
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSPROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSZac Darcy
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...Alexander Decker
 

Tendances (20)

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
P26093098
P26093098P26093098
P26093098
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
O26087092
O26087092O26087092
O26087092
 
Comparative study on priority based qos
Comparative study on priority based qosComparative study on priority based qos
Comparative study on priority based qos
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Ip2515381543
Ip2515381543Ip2515381543
Ip2515381543
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
 
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
 
A secure and service oriented
A secure and service orientedA secure and service oriented
A secure and service oriented
 
I41026670
I41026670I41026670
I41026670
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSPROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...
 

En vedette

Random 131228031948-phpapp02
Random 131228031948-phpapp02Random 131228031948-phpapp02
Random 131228031948-phpapp02rladnwls8
 
Formando en competencias planeacion (2)
Formando en competencias planeacion (2)Formando en competencias planeacion (2)
Formando en competencias planeacion (2)Liz Silva
 
brand new houses rush for sale/thru bank or in-house financing/ house and lot...
brand new houses rush for sale/thru bank or in-house financing/ house and lot...brand new houses rush for sale/thru bank or in-house financing/ house and lot...
brand new houses rush for sale/thru bank or in-house financing/ house and lot...Ma Erica Victoria Sacdalan
 
Guide to heterogeneous system architecture (hsa)
Guide to heterogeneous system architecture (hsa)Guide to heterogeneous system architecture (hsa)
Guide to heterogeneous system architecture (hsa)dibyendu.das
 
Diapositiva derecho civil sabado
Diapositiva derecho civil  sabadoDiapositiva derecho civil  sabado
Diapositiva derecho civil sabadoJessenia Narvaez
 
Prex i etapa 3_roteirode_pesquisa_2015
Prex i etapa 3_roteirode_pesquisa_2015Prex i etapa 3_roteirode_pesquisa_2015
Prex i etapa 3_roteirode_pesquisa_2015pablonaba
 
Guia do projeto discente semestral do 4 semestre 2015 01
Guia do projeto discente semestral do 4 semestre 2015 01 Guia do projeto discente semestral do 4 semestre 2015 01
Guia do projeto discente semestral do 4 semestre 2015 01 pablonaba
 
Dennis f. kinlaw pregação no espírito
Dennis f. kinlaw   pregação no espíritoDennis f. kinlaw   pregação no espírito
Dennis f. kinlaw pregação no espíritoMarco Antonio Prieto
 
La diagnosi in medicina generale. La teoria e la pratica (Riccardo De Gobbi)
La diagnosi in medicina generale. La teoria e la pratica (Riccardo De Gobbi)La diagnosi in medicina generale. La teoria e la pratica (Riccardo De Gobbi)
La diagnosi in medicina generale. La teoria e la pratica (Riccardo De Gobbi)csermeg
 
Lunes 3 noviembre a
Lunes 3 noviembre aLunes 3 noviembre a
Lunes 3 noviembre afmcharrera
 

En vedette (20)

Kg3617691773
Kg3617691773Kg3617691773
Kg3617691773
 
Ke3617561763
Ke3617561763Ke3617561763
Ke3617561763
 
Ko3618101814
Ko3618101814Ko3618101814
Ko3618101814
 
Kf3617641768
Kf3617641768Kf3617641768
Kf3617641768
 
Kd3617501755
Kd3617501755Kd3617501755
Kd3617501755
 
Lk3619561964
Lk3619561964Lk3619561964
Lk3619561964
 
Random 131228031948-phpapp02
Random 131228031948-phpapp02Random 131228031948-phpapp02
Random 131228031948-phpapp02
 
Formando en competencias planeacion (2)
Formando en competencias planeacion (2)Formando en competencias planeacion (2)
Formando en competencias planeacion (2)
 
Caletrava
Caletrava Caletrava
Caletrava
 
brand new houses rush for sale/thru bank or in-house financing/ house and lot...
brand new houses rush for sale/thru bank or in-house financing/ house and lot...brand new houses rush for sale/thru bank or in-house financing/ house and lot...
brand new houses rush for sale/thru bank or in-house financing/ house and lot...
 
Guide to heterogeneous system architecture (hsa)
Guide to heterogeneous system architecture (hsa)Guide to heterogeneous system architecture (hsa)
Guide to heterogeneous system architecture (hsa)
 
Diapositiva derecho civil sabado
Diapositiva derecho civil  sabadoDiapositiva derecho civil  sabado
Diapositiva derecho civil sabado
 
In pla paixaodesousa_fim
In pla paixaodesousa_fimIn pla paixaodesousa_fim
In pla paixaodesousa_fim
 
Prex i etapa 3_roteirode_pesquisa_2015
Prex i etapa 3_roteirode_pesquisa_2015Prex i etapa 3_roteirode_pesquisa_2015
Prex i etapa 3_roteirode_pesquisa_2015
 
Elcompradoronline
ElcompradoronlineElcompradoronline
Elcompradoronline
 
Guia do projeto discente semestral do 4 semestre 2015 01
Guia do projeto discente semestral do 4 semestre 2015 01 Guia do projeto discente semestral do 4 semestre 2015 01
Guia do projeto discente semestral do 4 semestre 2015 01
 
Dennis f. kinlaw pregação no espírito
Dennis f. kinlaw   pregação no espíritoDennis f. kinlaw   pregação no espírito
Dennis f. kinlaw pregação no espírito
 
Imagenes ingles
Imagenes inglesImagenes ingles
Imagenes ingles
 
La diagnosi in medicina generale. La teoria e la pratica (Riccardo De Gobbi)
La diagnosi in medicina generale. La teoria e la pratica (Riccardo De Gobbi)La diagnosi in medicina generale. La teoria e la pratica (Riccardo De Gobbi)
La diagnosi in medicina generale. La teoria e la pratica (Riccardo De Gobbi)
 
Lunes 3 noviembre a
Lunes 3 noviembre aLunes 3 noviembre a
Lunes 3 noviembre a
 

Similaire à Implementation and Analysis of Wimax Module under Ns2 with Varying Mobility

Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...inventionjournals
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...CSCJournals
 
Performance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdfPerformance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdfYAAKOVSOLOMON1
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلاییmorteza zilaie bouri
 
Wimax for Broadband Wireless access
Wimax for Broadband Wireless accessWimax for Broadband Wireless access
Wimax for Broadband Wireless accessNikhil Jagnade
 
Simulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerSimulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerIOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Improving the Quality of Service in WiMax Using NS3
Improving the Quality of Service in WiMax Using NS3Improving the Quality of Service in WiMax Using NS3
Improving the Quality of Service in WiMax Using NS3paperpublications3
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for floodingijcsa
 
Review Paper on 802.11ax Scheduling and Resource Allocation
Review Paper on 802.11ax Scheduling and Resource AllocationReview Paper on 802.11ax Scheduling and Resource Allocation
Review Paper on 802.11ax Scheduling and Resource Allocationijtsrd
 
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard: Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard: cscpconf
 
10 satishkumar final_paper--105--113
10 satishkumar final_paper--105--11310 satishkumar final_paper--105--113
10 satishkumar final_paper--105--113Alexander Decker
 
Survey on scheduling and radio resources allocation in lte
Survey on scheduling and radio resources allocation in lteSurvey on scheduling and radio resources allocation in lte
Survey on scheduling and radio resources allocation in lteijngnjournal
 

Similaire à Implementation and Analysis of Wimax Module under Ns2 with Varying Mobility (20)

Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
 
Hb3512341239
Hb3512341239Hb3512341239
Hb3512341239
 
Ew31992997
Ew31992997Ew31992997
Ew31992997
 
Performance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdfPerformance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdf
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی
 
Wimax for Broadband Wireless access
Wimax for Broadband Wireless accessWimax for Broadband Wireless access
Wimax for Broadband Wireless access
 
Simulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerSimulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical Layer
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
Ip2515381543
Ip2515381543Ip2515381543
Ip2515381543
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Improving the Quality of Service in WiMax Using NS3
Improving the Quality of Service in WiMax Using NS3Improving the Quality of Service in WiMax Using NS3
Improving the Quality of Service in WiMax Using NS3
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
 
Review Paper on 802.11ax Scheduling and Resource Allocation
Review Paper on 802.11ax Scheduling and Resource AllocationReview Paper on 802.11ax Scheduling and Resource Allocation
Review Paper on 802.11ax Scheduling and Resource Allocation
 
IEEE 806.16
IEEE 806.16IEEE 806.16
IEEE 806.16
 
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard: Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
 
Wi max
Wi maxWi max
Wi max
 
10 satishkumar final_paper--105--113
10 satishkumar final_paper--105--11310 satishkumar final_paper--105--113
10 satishkumar final_paper--105--113
 
Survey on scheduling and radio resources allocation in lte
Survey on scheduling and radio resources allocation in lteSurvey on scheduling and radio resources allocation in lte
Survey on scheduling and radio resources allocation in lte
 

Dernier

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Dernier (20)

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Implementation and Analysis of Wimax Module under Ns2 with Varying Mobility

  • 1. Shanasa Rahel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2181-2185 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Implementation and Analysis of Wimax Module under Ns2 with Varying Mobility Model Shanasa Rahel¹, Deepali Shukla² 1 M.E. (Electronics and Communication) ²Asst. Prof. Dept of E&C, MITM, Indore Abstract The network simulator 2 (ns-2) is a popular and powerful simulation tool for the simulation of packet-switched networks, which provides substantial support for simulation of TCP, routing, and MAC protocols over wired and wireless networks, such as wireless LANs, mobile ad hoc networks (MANETs), and satellite communications, etc, and is widely used in both academia and industry. Although many protocol modules have been implemented in the ns-2, the IEEE 802.16 broadband wireless access networks (BWANs) or WiMAX module has not been contributed yet. Thus, in this paper, we present our detailed design and implementation of the WiMAX module based on the IEEE 802.16 standard with the point-to-multipoint (PMP) mode for the ns-2. The implemented module comprises fundamental functions of the service-specific convergence sublayer (CS), the MAC common part sublayer (CPS), and the PHY layer. A simple call admission control (CAC) mechanism and the scheduler are also included in this module. I. Introduction The IEEE 802.16 standard forms the basis of Worldwide Interoperability for Microwave Access (WiMAX). It was developed by the WiMAX Forum with the objective of providing high speed data transfers over the air. The WiMAX Forum is an industry-led, non-profit organization that certifies and promotes the compatibility and interoperability of broadband wireless products based upon IEEE Standard 802.16 [1]. WiMAX has its origin in the computer industry and is an alternative to Third Generation Partnership Project (3GPP) and technologies like High Speed Packet Access (HSPA) and Long Term Evolution (LTE). The most popular network simulator used by the academia and industry is the network simulator 2 (ns-2) [11], which has become the de facto standards for the simulation of packet-switched networks. Specifically, more and more published wireless network studies and investigations use ns-2 to evaluate and verify their work. Although there still another force investigates the IEEE 802.16-based simulator [8], this simulator is not public. The ns-2 is roughly composed of various traffic models, transport-layer protocols, network-layer protocols, and medium access control (MAC) layer protocols, etc. These components enable ns-2 to simulate different types of networks and their topologies. Researchers can benefit from these preliminary tests on their investigation and find out the drawbacks of their new design in efficient way. Until today, as the best knowledge of the authors, no WiMAX/IEEE 802.16 module has been contributed to ns-2. Due to these reasons, we design and implement the WiMAX module for ns-2. The www.ijera.com developed WiMAX module is focused on MAC protocol development and inherited from the original MAC class in ns-2. This module is based on IEEE 802.16 point-to-multipoint (PMP) mode, which means that one BS can serve multiple subscriber stations (SSs) concurrently. We choose the orthogonal frequency-division multiple access (OFDMA) scheme for the physical (PHY) layer. Based on the OFDMA PHY specifications, it has been of major interest for both wireless applications due to its high date rate transmission capability and its robustness to multipath delay spread [9]. The IEEE 802.16 standard defines the specifications related to the service-specific convergence sublayer (CS), the MAC common part sublayer (CPS), the security sublayer, and the PHY layer. The MAC management messages, such as downlink/ uplink map (DL-MAP/UL-MAP), downlink/uplink channel descriptor (DCD/UCD), ranging request/response (RNGREQ/ RNG-RSP), and so forth are implemented following the 802.16 standard to operate the WiMAX networks. All operations between the base station (BS) and subscriber stations (SSs) over a superframe interval follow the compulsory procedures of the 802.16 standard. II. An Overview of IEEE 802.16 Standards The section briefly summarizes the operations of MAC and PHY layers in the IEEE 802.16 standard. Fig. 1 illustrates the architecture of IEEE 802.16. The CS provides any transformation or mapping of external network data that is received 2181 | P a g e
  • 2. Shanasa Rahel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2181-2185 through the CS service access point (SAP) and converts them into MAC service data units (MSDUs) received by the MAC layer through the MAC SAP. This sublayer includes classifying external network SDUs and associating them to the proper MAC service flow identifier (SFID) and connection ID (CID). In addition, it may also include the payload header suppression (PHS) function. The MAC CPS provides the core MAC functionality of system access, bandwidth allocation, scheduling, contention mechanism, connection establishment, and connection maintenance. It receives data from various CSs through the MAC SAP, which is classified to particular MAC connections. The IEEE 802.16-2004 standard supports four quality-of-service scheduling types: unsolicited grant service (UGS) for the constant bit rate (CBR) service, real-time polling service (rtPS) for the variable bit rate (VBR) service, non-real-time polling service (nrtPS) for non-real-time VBR, and best effort service (BE) for service with no rate or delay requirements. In 802.16e standard, there is an additional service type called extended real-time polling service (ertPS) for voice over IP (VoIP) service with silence suppression. These quality-of-service (QoS) classes are associated with certain predefined sets of QoSrelated service flow parameters, and the MAC scheduler supports the appropriate data handling mechanisms for data transport according to each QoS classes. The upper-layer protocol data units (PDUs) are inserted into different levels of queues with an assigned CID in the MAC layer after the SFID-CID mapping. These data packets in these queues are treated as MSDUs and then will be fragmented or packed into various sizes according to the MAC scheduling operations. They will be processed by a selective repeat automatic repeat request (ARQ) block mechanism if the ARQ-enabled function is on. For the UL traffic, each SS should range to the BS before entering the system. During the initial ranging period, the SS will request to be served in the DL via the particular burst profile by transmitting its choice of DL interval usage code (DIUC) to the BS. Afterwards, the BS will command the SS to use a particular uplink burst profile with the allocated UL interval usage code (UIUC) with the grant of SS in UL-MAP messages. The DL-MAP and UL-MAP contain the channel ID and the MAP information elements (IEs) which describes the PHY specification mapping in the UL and DL respectively. They are based on the different PHY specifications, such as single carrier (SC), single carrier access (SCa), OFDM, and OFDMA. The burst profile includes the DIUC, UIUC, and the typelength-value (TLV) encoded information. The TLV encoded information will notify the PHY layer of the modulation type, FEC code type, and encoding www.ijera.com www.ijera.com parameters. The MAC data payload is packed by these encoding type. The PHY layer requires equal radio link control (RLC), which is the capability of the PHY layer to transit from one burst profile to another. The RLC begins with the periodic BS broadcasting of the burst profiles which have been chosen for the downlink or the uplink connections. After the initial determination of downlink and uplink burst profiles between the BS and a particular SS, RLC continues to monitor and control the burst profiles. The SS can range with the RNGREQ message to request a change in the downlink burst profile. The channel measurements report request (REPREQ) message will be used by a BS to request signal-to-noise ratio (SNR) channel measurements reports. The channel measurement report response (REP-RSP) message is used by the SS to respond the channel measurements listed in the received REP-REQ. The IEEE 802.16 uses the frame-based transmission architecture where the frame length is variable. Each frame is called a superframe and is divided into two subframes: the DL subframe and the UL subframe. In this paper, we are focusing the frame structure of the OFDMA-PHY in time division duplex (TDD) mode. A DL subframe consists of DL subframe prefix to specify the modulation and coding (in PHY mode), the length of the first DL burst, and the broadcasted MAC control messages, e.g., the downlink channel descriptor (DCD) and the uplink channel descriptor (UCD). Both of them define the characteristics of the physical channels by comprising the detail information of the DL burst profile and the UL burst profile. Although IEEE 802.16 defines the connection signaling (connection requests and responses) between SS and BS, itdoes not define the admission control process. All packets from the application layer are classified by the connection classifier based on the CID and are forwarded to the appropriate queue. At the SS, the scheduler will retrieve the packets from the queues and transmit them to the network in the appropriate time slots as defined by the UL-MAP sent by the BS. The ULMAP is determined by the scheduler module based on the BW-request messages. These messages report the current queue size of each connection in SS. The IEEE 802.16 NS-2 Modules: The developed 802.16-based WiMAX module named as the Mac802 16 class is in accordance with the specifications of the IEEE 802.16-2004 standard [1] and based on the ns-2 version 2.29 [11]. All modules are designed by using object oriented programming language C++ and modeled as several classes. The relationship between the WiMAX module and legacy ns-2 modules is based on the original network component stack of the ns-2 as shown in Fig 2. It illustrates the type of objects for the traffic generating agent (TGA), the 2182 | P a g e
  • 3. Shanasa Rahel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2181-2185 link layer (LL), the interface queue (IFQ), the designed MAC layer (WiMAX module), and the PHY layer (Channel). First, the TGA is considered simply as an application level traffic generator that generates VoIP, MPEG, FTP, HTTP traffic, and so on. These traffic are classified into five different types of service, the UGS, rtPS, ertPS, nrtPS, and BE, each with its own priority. All packets will be transferred to different types of priority queues according to their service types by using CS layer SFID-CID mapping mechanism. The data packets in these queues are treated as MSDUs and will be selected to pass into the WiMAX module in a round robin manner. While the WiMAX module in the SS receives the MSDUs from the Queue object, the MAC management component will initiate the ranging process to enter the WiMAX system or to transmit the MSDUs according to the scheduled time obtained from UL-MAP. Once the process has been successfully finished in the MAC layer, the Network Interface will add a propagation delay and broadcast in the air interface. Simulation environment: Simulation Tool No.Of Nodes IEEE Standard BS Mobility Model Antenna Model Mobility Speed Routing Protocol Simulation Area Simulation Time III. NS-2 40 802.16 1 Random Way Point Omni Directional 20m/sec,250m/sec AODV,DSR,DSDV 2 Km 200 sec. Results & Analysis Wimax with low mobility Model: Parameter AODV DSR DSDV Delay(in ms) 146.73 413.15 139.44 Throughput(in kbps) 539.41 413.15 659.26 www.ijera.com End to End Delay Analysis: From Below Graphs in Fig1 and 2 it is clear that when node moves very rapidly than the delay is low as compare to the delay when the speed of nodes are slow. 500 400 300 200 100 0 AODV DSR DSDV Figure-1 126 124 122 120 118 116 114 112 110 108 Delay(in ms) AODV DSR DSDV Figure-2 Throughput Analysis: In terms of throughput it is clear from below figure 3 & 4 that the wimax module with high mobility in fig-3 shows better Data transmission known as throughput in kbps. In low speed model throughput is less as compare with high speed model shown in fig-4. 700 600 PDR (in %) 96.19 96.16 93.06 500 400 Throughput(in kbps) 300 Wimax with low mobility Model: 200 Parameter AODV DSR DSDV Delay(in ms) 122.14 124.73 114.34 Throughput(in 666.76 651.69 680.68 www.ijera.com 0 Figure-3 kbps) PDR (in %) 100 98.45 99.32 96.34 2183 | P a g e
  • 4. Shanasa Rahel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2181-2185 www.ijera.com References: [1] 700 600 500 400 Throughput(in kbps) 300 200 100 0 AODV DSR DSDV Figure-4 Packet Delivery Ratio Analysis: In terms of packet delivery ratio the wimax module with high mobility in figure 5 shows better performance than that of with low mobility model in figure-6 in our case we have taken low mobility scenario as 25m/sec and high mobility scenario as 250 m/sec 99.5 99 98.5 98 97.5 97 96.5 96 95.5 95 94.5 PDR (in %) AODV DSR DSDV Figure-5 97 96 95 94 PDR (in %) 93 92 91 AODV DSR DSDV Figure-6 Conclusion: We have implemented Firstly Wimax Module under Ns-2 Simulator and then analyzed its performance under various routing protocols. From above results it is clear that when in a wimax scenario nodes move rapidly than the overall performance of network is good in terms of PDR and Throughput as Compare to the scenario having slow speed of node movement. www.ijera.com Siva Ram Murthy, C., and Manoj, B.S. Second Edition, Low price Edition, Pearson Education, 2007.Ad-hoc Wireless Networks, Architectures and Protocols. [2] Feeney, L.M., and Nilsson, M., “Investigating the energy consumption of a wireless network interface in an Ad-hoc networking environment”, In Proceedings of the IEEE INFOCOM, pp.1548 - 1557, 2001. [3] Ramanathan, R., and Rosales-Hain, R.,“Topology control of multihop wireless networks using transmit power adjustment”, In Proceedings of the IEEE INFOCOM, pp. 404–413, 2000. [4] Suchismita Chinara and Santanu Kumar Rath, “Topology Control by Transmission Range Adjustment Protocol for Clustered Mobile Ad Hoc Networks”,ISRN Communications and Networking,2011 [5] Usop, N., Abdullah, A., and Abidin, A., “Performance Evaluation of AODV, DSDV and DSR routing Protocol in Grid Environment”, International Journal of Computer and Network Security, vol. 9, no. 7, 2009. [6] Rahman, A., and Zukarnain, Z., “Performance Comparison of AODV, DSDV and I-DSDV Routing Protocols in Mobile Ad-hoc Networks”, European Journal of Scientific Research, vol. 31, no. 4, pp. 566– 576, 2009. [7] Harminder S. Bindra, Sunil K. Maakar and Sangal, A.L., “ Performance Evaluation of Two Reactive Routing Protocols of MANET using Group Mobility Model”,IJCSI International Journal of Computer Science Issues, vol. 7, no. 10, May 2010. [8] Anwar, F., Azad, M., Rahman,M., and Uddin,M., “Performance Analysis of Ad-hoc Routing Protocols in Mobile WiMAX Environment,”IAENG International Journal of Computer Science, vol. 35, no. 3, pp. 353– 359,2008. [9] Vivek Thaper, Bindyia Jain, and Varsha Sahni, “Performance analysis of adhoc routing protocols using random waypoint mobility model in wireless sensor networks”, International Journal on Computer Science and Engineering (IJCSE),August 2011. [10] Sreerama Murty, M.,and Venkat Das,M., “Performance Evalution of MANET Routing Protocols using Reference Point Group Mobility and Random WayPoint Models”,International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) vol.2, no.1, March 2011 [11] Nadesh, R. K., Sumathy, D., and Benjula Anbu Malar, M.B. “Performance Analysis of MANET (WLAN) Using Different Routing 2184 | P a g e
  • 5. Shanasa Rahel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2181-2185 [12] [13] [14] [15] [16] [17] [18] www.ijera.com Protocols in Multi service Environments-An Quantitative Study”, Advanced Networking and Applications vol. 03, no.02, pp:10761079 ,2011. Boomarani Malany,A.,Sarma Dhulipala, V.R., and Chandrasekaran, RM , “Throughput and Delay Comparison of MANET Routing Protocols” ,Int. J. Open Problems Compt. Math.,vol. 2, no. 3, September 2009. Rajneesh Kumar Gujral, and Manpreet Singh, “Performance Analysis of Ad hoc Routing Protocols for Voice Communication Support over Hybrid MANETs”, IJCA vol. 22,no.3, May 2011. Godder,T.K., Hossain,M.M., Rahman,M.M., Sipon Miah,Md and Mondal, S. K., “Performance comparison and analysis of mobile ad hoc routing Protocols” ,Computer Science & Engineering: An International Journal (CSEIJ), vol.1, no.1, April 2011. Charles Perkins, Elizabeth Royer, and Samir Das., “Ad-hoc on demand distance vector (AODV) routing”, July 2003. David B. Johnson and David A. Maltz, “Dynamic source routing in Ad-hoc wireless networks”, Technical report, Carnegie Mellon University, 1996. NETWORK SIMULATOR (ns2). http://www.isi.edu/nsnam/ns/. Marc Geris' Tutorial for the UCB/LBNL/VINT Network Simulator "ns" www.ijera.com 2185 | P a g e